cscli scenarios install sigmahq/proc_creation_win_browsers_chromium_mockbin_abuse
1type: trigger2name: sigmahq/proc_creation_win_browsers_chromium_mockbin_abuse3description: |4 Detects the execution of a Chromium based browser process with the "headless" flag and a URL pointing to the mockbin.org service (which can be used to exfiltrate data).5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && ((evt.Parsed.Image endsWith '\\brave.exe' || evt.Parsed.Image endsWith '\\chrome.exe' || evt.Parsed.Image endsWith '\\msedge.exe' || evt.Parsed.Image endsWith '\\opera.exe' || evt.Parsed.Image endsWith '\\vivaldi.exe') && evt.Parsed.CommandLine contains '--headless' && (evt.Parsed.CommandLine contains '://run.mocky' || evt.Parsed.CommandLine contains '://mockbin'))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:1415 label: "Chromium Browser Headless Execution To Mockbin Like Site"16 behavior : "windows:audit"17 remediation: false1819scope:20 type: ParentProcessId21 expression: evt.Parsed.ParentProcessId2223